Supporting Applications Development and Operation Using IT Security and Audit Measures
نویسنده
چکیده
The market success of the enterprises depends on the ability to support their business processes. This involves the requirement of a seamless, well-ordered operation of the whole company. Operation is greatly affected by the quality of its IT support. The information should be available, handled confidentially, preserving its integrity, have to be processed in a reliable, efficient, effective way, in compliance with the requirements of supervisory authorities. Extending the scope of these information criteria to criteria determining operations quality and adding two business-level requirements to them makes possible to find preventive, detective and corrective, originally information security control measures, raised to the level of operational quality, that support the market success of the institutions. 1. A Method Based on IT Security and Audit for Supporting Corporate Governance The goal is to facilitate the use of the originally information security and information systems audit ideas and tools in the area of corporate governance. In the followings the criteria characterizing such a corporate IT functioning, that is able to contribute to the compliance to a widely accepted set of requirements, are extended to the area of corporate operations. To operations belong every area, that supports business. Corporate finance, controlling, human resource management, and the like all belong here. Without them no business could operate. In order to improve IT processes ISACA (Information Systems Audit and Control Association) was probably the first organization, that collected all these criteria. If we extend the scope of the measures by which some of these criteria can be fulfilled, to other business-supporting areas, then these criteria can also be raised to the level op corporate operations. This possibility of discussing the problems in a greater arena then before, will be illustrated here on a special application, on the service-oriented architectures. 2. Business Goals and Information Security Seamless operation is one of the basic factors of the corporate market success. Improvement of operational quality, and compliance to the requirements coming from government and other authorities are vital. IT applications are non-separably interwoven into the everyday and even into the strategic level activities of every company. Thus to the fulfillment of the strategic business goals, computer applications have to support the – often contradictory – aspects of operation and compliance. An efficient IT of a professionally operating firm follows best practice methods. Good examples are the methodologies of such prominent
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملPresenting a Model for Social Responsibility of Audit Firms Using Grounded Theory Method
This study was aimed to present a model for social responsibility of audit firms using the grounded theory method. To this end, the components and dimensions of social responsibility model of audit firms were identified and explained. The research method was applied in terms of purpose, mixed (qualitative-quantitative)exploratoryin termsof datatype, anddescriptive-correlationalinterms of data c...
متن کاملDesigning Secure Data Warehouses by Using MDA and QVT
The Data Warehouse (DW) design is based on multidimensional (MD) modeling which structures information into facts and dimensions. Due to the confidentiality of the data that it stores, it is crucial to specify security and audit measures from the early stages of design and to enforce them throughout the lifecycle. Moreover, the standard framework for software development, Model Driven Architect...
متن کاملComparative analysis of profit between three dissimilar repairable redundant systems using supporting external device for operation
The importance in promoting, sustaining industries, manufacturing systems and economy through reliability measurement has become an area of interest. The profit of a system may be enhanced using highly reliable structural design of the system or subsystem of higher reliability. On improving the reliability and availability of a system, the production and associated profit will also increase. Re...
متن کاملAssurance: the power behind PCASSO security
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- e-Informatica
دوره 6 شماره
صفحات -
تاریخ انتشار 2012